A Reliable File Protection System Based on Transparent Encryption

Size: px
Start display at page:

Download "A Reliable File Protection System Based on Transparent Encryption"

Transcription

1 , pp A Reliable File Protection System Based on Transparent Encryption Jun Liu 1, ShuYu Chen 2*, MingWei Lin 1 and Han Liu 1 1 College of Computer Science, Chongqing University, Chongqing, China 2 College of Software Engineering, Chongqing University, Chongqing, China oldcattleliu@cqu.edu.cn, netmobilab@cqu.edu.cn, visualliu@126.com Abstract As data leakage moves to ever more challenging areas, improving the security level of anti-data leakage and lowering overhead to the operating system becomes increasingly important. Therefore, the paper presents a novel double cache file filter driver based on transparent encryption, called as DBFD. In order to boost security of data, that is controlled by the file filter driver. The DBFD overcomes the limitation of double cache in the file system kernel in windows operating system and used the transparent encryption method to protect the data security. To evaluate DBFD, we used Iometer as the measurement tools to measure performance. The simulation results indicate that proposed DBFD has higher security, less overhead to the windows operating system. Keywords: File Filter Driver, Transparent Encryption, Double Cache, Data Leakage 1. Introduction At present, we have many urgent things to deal with in data security, one of which is the data leakage. Data leakage is the one of the main problems of data security for most enterprises. The problem of data security does not only come from hacker Intrusion, Trojan horse programs and other security threats from the internet. In fact more security threats come from enterprise itself because of lack of security experience. A lot of important documents are stored in a sensitive position directly, such as desktop and my documents folder in windows operating system. There are many technologies about the solutions of the information security. Intrusion detection, firewalls and private networks and are traditional methods in information security. Generally speaking, intrusion detection systems, which are used in networks, are to monitor some malicious or abnormal behavior [1, 2]. Firewalls are controlled link systems aimed to protect threats and attacks from the internet and network-based [3]. Private networks, commonly used for home, office, and enterprise, are local area networks that private IP address space [4]. But these methods are difficult to prevent data leakage because they are suitable for dealing with network and malicious code attack. Sand-box security model is another important security mechanism, which can execute untrusted or unknown applications. Sand-box can prevent these attacks from being successful by watching the code for adherence to a specific policy [5]. But there is an obvious defect in sand-box mechanism, which has a large overhead for security checks. This paper introduces a reliable protection system, which can control the access of files and documents by specific applications. The protection system controls data leakage by transparent encryption technologies. The processes of encryption and decryption are executed in file systems using file filter driver and are completely transparent to users. In order to ISSN: IJSIA Copyright c 2014 SERSC

2 improve efficiency of data checks, the system creates double caches in file system and breaks the single buffer limit of Windows operating system kernel buffer manager. The system must ensure the reliability intercepted the read and write operations of files and documents through the analysis and research of the reading and writing mode accessing by applications. The paper is organized as follows: Section 2 presents the related work for data leakage and the reliable protection system is discussed in Section 3; Section 4 shows the experimental results. Finally, in section 5 final remarks and a conclusion are presented. 2. Related Work The innovative idea of control file access has stimulated much research in this area. An excellent review of control data leakage can be found in Ref. [6]. In the following, we will briefly summarize anti-data leakage works, encompassing very recent research. Transparent encryption technologies based on file system filter drivers are widely used in preventing data leakage. The encrypting file system (EFS) using transparent encryption technology first showed up in the Windows operating system. Although the technology has the advantages of high safety, simple, easy to use and closely relation to the operating system, there are still some problems in the practical application, mainly reflected in the following two aspects. Firstly, EFS only supports NTFS file system, does not support FAT file system. Secondly, EFS can only encrypt files and folders, and does not support in file type or the specified program file encryption [12]. Aiguo HE and Tomohiro Ohdaira proposed FP (File Protector ) [6] using file hook driver to monitor only the file access in Microsoft Windows environment. At the same time FP draws lessons from the sand-box security model based function. The main purpose is to improve the execution time of application programs running under the sand-box security mode [6]. But the main disadvantage of FP is that the overhead to the operating system is higher. Sand-box security model is extremely useful for secure execution of untrusted applications, Many security systems based on sand-box model so far provide security by intercepting system calls invoked by applications and controlling their execution [7] [8]. There are many platforms for control file access under sand-box. Safe-Tcl [9] introduces padded cells. The padded cells are separated environments that can identify the trust and distrust application programs. Safe-Tcl is written in the Tcl scripting language [9]. Tcl scripting language has Tcl Interpreter. The important thing is that the process of interpreter will take some time [10]. MAPbox [11] is a classification mechanism based on sand-boxes by retaining the ease of use of application-class-specific. However, these mechanisms are difficult for computer users to manger [6], because they are so complex and increase the memory consumption to operating system. Access control list (ACL) is another important guard against data leakage mechanism. ACL can control the security behavior associated with a given (protected) object of some sort. [13]. ACL based on managing access control policy was proposed in Ref [14, 15]. However, it is very difficult for computer novices to manage the control policy [6], because the control policy is not easy to computer novices. Another disadvantage of ACL is that the consumption to operating system of ACL is more than the mechanism based on file system filter drivers. 3. The Design and Implementation of DBFD An efficient preventing data leakage model must focus on reducing the check over access cost and controlling the way to read important or sensitive data. To achieve these goals, we propose a novel double cache file filter driver based on transparent encryption policy, which is called DBFD, for data leakage. 124 Copyright c 2014 SERSC

3 The key of the DBFD is the introduction of double cache file system filter driver based on transparent encryption. In this model, all the important and sensitive data must be encrypted. There is a file filter driver in DBFD. The file filter driver is manger to buffer for every file. In general a driver only allocates a buffer in windows operating system kernel. In order to improve the efficiency of access file, the DBFD file filter driver overcomes a buffer in windows operating system and creates two buffers for a file in windows kernel. Authorization application accesses the encryption files by specific buffer which contains the plain text of encryption files. The applications that do not have the proper authorization access encryption files by another buffer which contains the ciphertext of encryption files. That is the encryption files will not be decrypted when unauthorized applications access encryption files. The two buffers and the process of encryption and decryption are managed by file filter driver Creating Double Cache The buffer manager in windows operating system must maintain the information of each file buffer. This information is maintained by cache bitmap. The buffer manager allocates a structure of shared cache bitmap to save the file and associated with the file information. The structure of shared cache bitmap is allocated in the file buffer by a file system driver or network redirection request initialization. It is important to share cache bitmap which is unique for each file, because buffer manager allocate the private cache map when the file buffer for the first time established. The buffer manager uses the structure to manage file information, such as prefetching control and access information. It is important that these information and structure are maintained by buffer manager in windows operating system. In order to create the two buffers for a file in windows operation system kernel, DBFD proposed the method of copy interface. The method of copy interface is that file filter driver copy the contents of file buffers to user buffers or copy the contents of user buffers to file buffers. At the same time, file filter driver need map a specific virtual address range to physically address composed of one or more pages. Fig. 1 illustrates the process of using double cache to read the file. As shown in Figure 1, there is a cache control block (CCB) in order to query or scheduling cache in DBFD. The CCB records file name, file object and cache pointer.etc information corresponding to the buffer. So that DBFD can convenient query, modify and scheduling buffer Authorization and Unauthorized Process Only authorization processes can access encryption files in DBFD. Unauthorized processes can not access encryption files. The authorization processes are that applications, which can access important or sensitive data for user or company. These files created by these applications are encrypted. The process of encryption and decryption is transparent to authorization processes, because filter driver deal with the operation of encryption and automatic. The identification of authorization is through processes name. There is a structure, which is called EPprocess, in operating system kernel. The structure includes many processes information. Processes name is one of the important parameter in the structure. DBFD introduced MD5 algorithm to prevent fake authorization process by rename processes, because every file has a unique value no matter what type of file. Figure 2 describes the whole process of judgment in detail. Copyright c 2014 SERSC 125

4 Microsoft Word Microsoft Excel User space readfile Encryption file (a.txt) Kennel Decryption buffer Encryption buffer Manger multi-buffers by CCB readfile complete Figure 1. Cache Control Block Maintain two Caches Authorization files Creating MD5 value and saving the value Strategy file IRP Get process name and find in Strategy file Unauthorization N judge whether the authorization process Y Get MD5 value of the process and find in strategy file Whether Legal authorization process Y Authorization Figure 2. The Flow Chart of Allowed-process Judgement 3.3. Encrypted File Identifier There are mainly two methods to store the encryption flags in file filter driver. For one thing, the encryption flags are stored in the end of the file. For another, the encryption flags are placed at the beginning of the file. Figure 3 shows three status of the encryption files. Figure 3 (a) presents the initial status. Figure 3 (b) presents the status that the encryption flags are located in the end of the file. Assume that the original size of the file is P. The encryption flags size is P. The encryption flags size is defined as ( L ). Then the encrypted file length is ( P L). Although the file size in Figure 3(b) and Figure 3(c) are equal, there is a distinct difference between Figure 3(b) and Figure 3(c). In case of Figure 3(b), the encryption file size 126 Copyright c 2014 SERSC

5 is ( P L), when user open the file properties to view file size in windows operating system. In case of Figure 3(c), the encryption file size is ( P ) under the same conditions. Obviously, saving the encryption flags at the beginning of the file is a good method, which is used in DBFD. P1 P2 P1 ( a ) The initial status of The file P2 ( b ) Encryption tags at the end of the file P1 L P2 L ( c ) Encryption tags at the begin of the file Figure 3. The Storage of Encryption Tags The read and write operations will recalculate because of saving the encryption flags at the beginning of the file. As shown in Figure 4, assume that data will be written from position Pw1 to Pw2, the actual writing position is ( L Pw1 ). The size of writing is ( Pw2 Pw1). P2 Write operation Pw1 Pw2 Figure 4. Write Operation Figure 5 illustrates the encryption identification process of generation and judgment. Generally speaking, IRP_MJ_WRITE and IRP_MJ_SET_INFORMATION command are dispatched by I/O manager, and the encryption flags are added when file filter driver received the IRP_MJ_WRITE command. The file size is handled in IRP_MJ_SET_INFORMATION command. User space Kernel space Winword.exe IRP_MJ_Write Add information such as encryption tags Redirect the write operation IRP_MJ_SET_INFORMATRION Page I/O Hard Disk Figure 5. Process of Adding Encryption Flag and Changing File Length Copyright c 2014 SERSC 127

6 3.4. Encryption Algorithm In DBFD, the file contents are protected by security features based on AES256 symmetric encryption algorithm, because asymmetric algorithm has slower speed in encryption than symmetric algorithm. Each file encryption keys generated randomly is stored at the beginning of the file. The beginning of the file is named encryption flags area. The encryption flags area size is defined as ( L ) in DBFD. The value of ( L ) is 4KB that 4KB is aligned unit when the buffer writes data to hard disk. Obviously, the 4KB data is very important. So, the 4KB data is encrypted using RSA asymmetric encryption algorithm, because asymmetric algorithm has higher security in encryption. Encryption keys including public key and private key are generated using random function during system initialization. The private key is stored in USB devices, and the public key is stored in the system configuration file. The private key stored in USB devices should be encrypted again using symmetric encryption algorithm in which key is created by MD5 algorithm, because the private key is very important. Figure 6 describes the detail relationship with the encryption keys. To protect the private key of the key generating by MD5 arithmetic Randomly generated public/private key pair The private key is stored in USB drive after encryption. Decrypt the private key saving in USB devices, getting encryption key using encrypted file head Randomly generated file encryption key Using public key to encrypt Encryption file head (encryption flags) Encryption file (file content) 4. Experimental Evaluations Figure 6. Relationship of the Encryption Keys We have been implemented the prototype of DBFD in order to investigate the performance of our proposed DBFD system, and the prototype is tested in a test PC, which is configured as: AMD Athlon(tm) Dual Core processor 2.20 GHz, 2000 MB RAM, Windows XP with service pack 3 and a 500 GB Seagate. The overall performance of DBFD has been compared with that in a native environment which has no DBFD prototype, and the results of experiment show that the DBFD has less overhead to operating system. In order to evaluate the performance consumption of windows operating system, we used Iometer as the measurement tools, which is an I/O subsystem measurement and measures performance of storage system such as Disk. Testing may be conducted by changing three parameters: percentage of read (%read), percentage of randomness (%rand) and percentage of write (%write). In the experiments, we take two kinds of combination way to test, which are (100%read, 0%write, 100%rand) and (0%read, 100%write, 100%Sequential), respectively. The file size of the read and write operations increase from 512byte to 4Mbs. As show in Fig. 7, DBFD has little overhead to windows operating system, because test results in DBFD are similar with local environment. 128 Copyright c 2014 SERSC

7 CPU Utilization (%). CPU Utilization (%). International Journal of Security and Its Applications native DBFD B 4K 16K 32K 64K 128K 256K 512K 1M 2M 4M Request Size (a) (100%read, 0%write, 100%rand) native DBFD B 4K 16K 32K 64K 128K 256K 512K 1M 2M 4M Request Size (b) (100%read, 0%write, 100%rand) Figure 7. CPU Utilization between Native Environment and DBFD DBFD should affect the response time of file read and write to a certain degree, that file system encrypt the data automatic. There fore copy multiple files and large files are tested in order to access the response time in copy file operations. As shown in Figure 8, the response time in DBFD is close to native environment when the files size increases from 50MB to 4GB. Copyright c 2014 SERSC 129

8 Reponse Time ( S ) International Journal of Security and Its Applications MB 100MB 200MB 500MB 1GB 2GB 4GB File Size ( MB ) native DBFD Figure 8. Response Time for Different File Size in Copy File Operations 5. Conclusion In this paper, we propose a double cache file filter driver layer based on transparent encryption, which is called DBFD, to prevent data leakage. DBFD introduces double cache in file filter driver in order to improve the performance of read and write operations. There is better security in DBFD, because the file content uses AES256 algorithm and encryption keys use RSA algorithm. We conducted a series of experiments and obtained encouraging results. Acknowledgements We are grateful to the editors and anonymous reviewers for their valuable comments on this paper. The work of this paper is supported by National Natural Science Foundation of China (Grant No ) and Research Fund for the Doctoral Program of Higher Education of China (Grant No ). References [1] G. Pannell and H. Ashman, Anomaly Detection over User Profiles for Intrusion Detection, Proceedings of the 8th Australian Information Security Management Conference, Perth, Australia, (2010) November 30- December 2. [2] X. Huang, X. Wang and S. Zhu, Research on firewall system for confidential network, Advanced Materials Research, vol , (2012), pp [3] R. Oppliger, Internet security: Firewalls and beyond, Communications of the ACM, vol. 40, no. 5, (1997) May, pp [4] [5] T. Khatiwala, R. Swaminathan and V. N. Venkatakrishnan, Data Sandboxing: A Technique for Enforcing Confidentiality Policies, Proceedings of 22nd Annual Computer Security Applications Conference, Miami Beach, Florida, (2006) December [6] H. E. Aiguo and T. Ohdaira, A Case Study: File Access Privacy Control Using Filter Hook Driver, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications, Chendu, China, (2009) August [7] V. Prevelakis and D. Spinellis, Sandboxing Applications, Proceedings of the USENIX Technical Annual Conference, Boston, USA, (2001) June [8] D. W. Goldberg, R. Thomas and E. Brewer, A secure environment for untrusted helper applications confining the Wily Hacker, Proceedings of the 6th conference on USENIX Security Symposium, California, USA, (1996) July Copyright c 2014 SERSC

9 [9] J. K. Ousterhout, J. Y. Levy and B. B. Welch, The Safe-Tcl Security Model, Proceedings of the USENIX Annual Technical Conference, Orleans, USA, (1998) June [10] B. Welch, Practical Programming in Tcl and Tk, Prentice-Hall, ISBN , (1995). [11] A. Acharya and M. Raje, MAPBox: Using Parameterized Behavior Classes to Confine Untrusted Applications, Proceedings of the 9th USENIX Security Symposium, Denver, USA, (2000) August [12] [13] [14] K. Kida, H. Sakamoto, H. Shimazu and H. Tarumi, A Proposal of File Access Control Software Agent Toward Using P2P File Sharing System in Safety, IPSJ Journal, vol. 48, no. 1, (2007), pp [15] S. Kai, M. Arai, Y. Nagai, S. Tomida and S. Tezuka, Proposal of File Access Control Scheme for Client Protecting Information Assets from Illegal Programs, IPSJ Journal, vol. 46, no. 8, (2005), pp Authors Jun Liu, received his B.S. degree in Southwest University, P. R. China, at 2001, and M.S. degree in Chongqing University, P. R. China, at Currently he is a Ph.D. candidate in College of Computer Science, at Chongqing University. His current interests include flash memory, information security, Linux Kernel and big data analytics. ShuYu Chen, he received his Ph.D. degree in Chongqing University, P. R. China, at Currently, he is a professor of College of Software Engineering at Chongqing University. His research interests include embedded Linux system, distributed systems, cloud computing, etc. He has published over 120 journal and conference papers in related research areas during recent years. MingWei Lin, received his B.S. degree in Chongqing University, P. R. China, at He is currently a Ph.D. candidate in Chongqing University. He is invited as the reviewer by Journal of Systems and Software, as well as Computers and Electrical Engineering. His current interests include flash memory, Linux Kernel, information security and wireless sensor network. Han Liu, received his B.S. degree in Chongqing University, P. R. China, at 2002, and M.S. degree in Chongqing University, P. R. China, at His current interests include date backup and recovery, information security, Linux Kernel. Copyright c 2014 SERSC 131

10 132 Copyright c 2014 SERSC

Encrypt-FS: A Versatile Cryptographic File System for Linux

Encrypt-FS: A Versatile Cryptographic File System for Linux Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique

More information

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1 Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,

More information

On Benchmarking Popular File Systems

On Benchmarking Popular File Systems On Benchmarking Popular File Systems Matti Vanninen James Z. Wang Department of Computer Science Clemson University, Clemson, SC 2963 Emails: {mvannin, jzwang}@cs.clemson.edu Abstract In recent years,

More information

Microsoft Office Outlook 2013: Part 1

Microsoft Office Outlook 2013: Part 1 Microsoft Office Outlook 2013: Part 1 Course Specifications Course Length: 1 day Overview: Email has become one of the most widely used methods of communication, whether for personal or business communications.

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,

More information

Performance Report Modular RAID for PRIMERGY

Performance Report Modular RAID for PRIMERGY Performance Report Modular RAID for PRIMERGY Version 1.1 March 2008 Pages 15 Abstract This technical documentation is designed for persons, who deal with the selection of RAID technologies and RAID controllers

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

OSDsim - a Simulation and Design Platform of an Object-based Storage Device

OSDsim - a Simulation and Design Platform of an Object-based Storage Device OSDsim - a Simulation and Design Platform of an Object-based Storage Device WeiYa Xi Wei-Khing For DongHong Wang Renuga Kanagavelu Wai-Kit Goh Data Storage Institute, Singapore xi weiya@dsi.a-star.edu.sg

More information

Online Remote Data Backup for iscsi-based Storage Systems

Online Remote Data Backup for iscsi-based Storage Systems Online Remote Data Backup for iscsi-based Storage Systems Dan Zhou, Li Ou, Xubin (Ben) He Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 38505, USA

More information

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

A Data De-duplication Access Framework for Solid State Drives

A Data De-duplication Access Framework for Solid State Drives JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 941-954 (2012) A Data De-duplication Access Framework for Solid State Drives Department of Electronic Engineering National Taiwan University of Science

More information

Res. J. Appl. Sci. Eng. Technol., 5(7): 2439-2444, 2013

Res. J. Appl. Sci. Eng. Technol., 5(7): 2439-2444, 2013 Research Journal of Applied Sciences, Engineering and Technology 5(7): 2439-2444, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 26, 2012 Accepted: September

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

A Composite Intelligent Method for Spam Filtering

A Composite Intelligent Method for Spam Filtering , pp.67-76 http://dx.doi.org/10.14257/ijsia.2014.8.4.07 A Composite Intelligent Method for Spam Filtering Jun Liu 1*, Shuyu Chen 2, Kai Liu 1 and ong Zhou 1 1 College of Computer Science, Chongqing University,

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics

Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics 577 Hitachi Review Vol. 63 (2014),. 9 Featured Articles Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics Ken Naganuma Masayuki Yoshino, Ph.D. Hisayoshi Sato, Ph.D. Yoshinori

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

Secure data storage. André Zúquete Security 1

Secure data storage. André Zúquete Security 1 Secure data storage André Zúquete Security 1 Problems (1/3) ( The classical file system protection is limited Physical protection assumptions Physical confinement of storage devices Logical protection

More information

Wireless ATA: A New Data Transport Protocol for Wireless Storage

Wireless ATA: A New Data Transport Protocol for Wireless Storage Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr

More information

Scalable Multiple NameNodes Hadoop Cloud Storage System

Scalable Multiple NameNodes Hadoop Cloud Storage System Vol.8, No.1 (2015), pp.105-110 http://dx.doi.org/10.14257/ijdta.2015.8.1.12 Scalable Multiple NameNodes Hadoop Cloud Storage System Kun Bi 1 and Dezhi Han 1,2 1 College of Information Engineering, Shanghai

More information

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

Safeguard Intranet Using Embedded and Distributed Firewall System

Safeguard Intranet Using Embedded and Distributed Firewall System Safeguard Intranet Using Embedded and Distributed Firewall System Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, and Tsung-Che Yang Department of Computer Science and Information Engineering,

More information

Study on Secure File Transfer Scheme on ARM9-based Security

Study on Secure File Transfer Scheme on ARM9-based Security Study on Secure File Transfer Scheme on ARM9-based Security Authentication Platform * (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201) * Email:idlink@163.com

More information

SAN Data Encryption System on iscsi

SAN Data Encryption System on iscsi 2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.51 SAN Data System on iscsi

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou! Center for Secure Information Systems! George Mason University!

More information

Detection of Promiscuous Nodes Using ARP Packets

Detection of Promiscuous Nodes Using ARP Packets Detection of Promiscuous Nodes Using ARP Packets Version 1.0 Written by: 31Aug01 Daiji Sanai Translated by: Kelvin KingPang Tsang http://www.securityfriday.com 1 Contents Abstract...3

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,

More information

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical

More information

Fusionstor NAS Enterprise Server and Microsoft Windows Storage Server 2003 competitive performance comparison

Fusionstor NAS Enterprise Server and Microsoft Windows Storage Server 2003 competitive performance comparison Fusionstor NAS Enterprise Server and Microsoft Windows Storage Server 2003 competitive performance comparison This white paper compares two important NAS operating systems and examines their performance.

More information

Prevention of Anomalous SIP Messages

Prevention of Anomalous SIP Messages International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication

More information

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

SH-Sim: A Flexible Simulation Platform for Hybrid Storage Systems

SH-Sim: A Flexible Simulation Platform for Hybrid Storage Systems , pp.61-70 http://dx.doi.org/10.14257/ijgdc.2014.7.3.07 SH-Sim: A Flexible Simulation Platform for Hybrid Storage Systems Puyuan Yang 1, Peiquan Jin 1,2 and Lihua Yue 1,2 1 School of Computer Science and

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

A New Mechanism for Service Recovery Technology by using Recovering Service s Data

A New Mechanism for Service Recovery Technology by using Recovering Service s Data A New Mechanism for Service Recovery Technology by using Recovering Service s Data Monire Norouzi Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran Monire_norouzi@yahoo.com

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Privacy Patterns in Public Clouds

Privacy Patterns in Public Clouds Privacy Patterns in Public Clouds Sashank Dara Security Technologies Group, Cisco Systems, Bangalore email: krishna.sashank@gmail.com January 25, 2014 Abstract Internet users typically consume a wide range

More information

Installing, Configuring and Administering Microsoft Windows

Installing, Configuring and Administering Microsoft Windows Unit 21: Installing, Configuring and Administering Microsoft Windows Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Perform and troubleshoot an attended

More information

High Performance Tier Implementation Guideline

High Performance Tier Implementation Guideline High Performance Tier Implementation Guideline A Dell Technical White Paper PowerVault MD32 and MD32i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS

More information

The Behavioral Analysis of Android Malware

The Behavioral Analysis of Android Malware , pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,

More information

SAS Data Set Encryption Options

SAS Data Set Encryption Options Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

Modern Accounting Information System Security (AISS) Research Based on IT Technology

Modern Accounting Information System Security (AISS) Research Based on IT Technology , pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows

More information

Evaluation of Software Write Blocking In SAFE Block XP V1.1

Evaluation of Software Write Blocking In SAFE Block XP V1.1 Evaluation of Software Write Blocking In SAFE Block XP V1.1 University of Rhode Island Digital Forensics Center Web: dfc.cs.uri.edu June 30, 2008 Technical Report 2008-52-1 Sean Alvarez University of Rhode

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Navigating Endpoint Encryption Technologies

Navigating Endpoint Encryption Technologies Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

Computer Architecture. Secure communication and encryption.

Computer Architecture. Secure communication and encryption. Computer Architecture. Secure communication and encryption. Eugeniy E. Mikhailov The College of William & Mary Lecture 28 Eugeniy Mikhailov (W&M) Practical Computing Lecture 28 1 / 13 Computer architecture

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages

Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages Soohyun Yang and Yeonseung Ryu Department of Computer Engineering, Myongji University Yongin, Gyeonggi-do, Korea

More information

Strong Security for Distributed File Systems

Strong Security for Distributed File Systems Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached

More information

HP Z Turbo Drive PCIe SSD

HP Z Turbo Drive PCIe SSD Performance Evaluation of HP Z Turbo Drive PCIe SSD Powered by Samsung XP941 technology Evaluation Conducted Independently by: Hamid Taghavi Senior Technical Consultant June 2014 Sponsored by: P a g e

More information

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Offloading file search operation for performance improvement of smart phones

Offloading file search operation for performance improvement of smart phones Offloading file search operation for performance improvement of smart phones Ashutosh Jain mcs112566@cse.iitd.ac.in Vigya Sharma mcs112564@cse.iitd.ac.in Shehbaz Jaffer mcs112578@cse.iitd.ac.in Kolin Paul

More information

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts Usages of Selected Antivirus Software in Different Categories of Users in selected Districts Dr. Bhaskar V. Patil 1, Dr. Milind. J. Joshi 2 Bharati Vidyapeeth University Yashwantrao Mohite institute of

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

COURCE TITLE DURATION CompTIA A+ Certification 40 H. COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.

More information

Performance Analysis of Client Side Encryption Tools

Performance Analysis of Client Side Encryption Tools Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are

More information

An Implementation of Storage-Based Synchronous Remote Mirroring for SANs

An Implementation of Storage-Based Synchronous Remote Mirroring for SANs An Implementation of Storage-Based Synchronous Remote Mirroring for SANs SHU Ji-wu, YAN Rui, WEN Dongchan, ZHENG Weimin Department of Computer Science and Technology, Tsinghua University, Beijing 100084,

More information

Secure Storage. Lost Laptops

Secure Storage. Lost Laptops Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Introduction to BitLocker FVE

Introduction to BitLocker FVE Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk

More information

Chapter 8 A secure virtual web database environment

Chapter 8 A secure virtual web database environment Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services

More information

Byte-index Chunking Algorithm for Data Deduplication System

Byte-index Chunking Algorithm for Data Deduplication System , pp.415-424 http://dx.doi.org/10.14257/ijsia.2013.7.5.38 Byte-index Chunking Algorithm for Data Deduplication System Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2 and Young Woong Ko

More information

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Do standard tools meet your needs when it comes to providing security for mobile PCs and data media? Product Insight Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media? Author Version Document Information Utimaco Product Management Device Security 4.30.00

More information

70-271. Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version

70-271. Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A DEMO Version Copyright (c) 2007 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration

More information

70-685: Enterprise Desktop Support Technician

70-685: Enterprise Desktop Support Technician 70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application

More information

Global Journal of Computer Science and Technology

Global Journal of Computer Science and Technology Global Journal of Computer Science and Technology Volume 12 Issue 10 Version 1.0 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering

More information

In-Block Level Redundancy Management for Flash Storage System

In-Block Level Redundancy Management for Flash Storage System , pp.309-318 http://dx.doi.org/10.14257/ijmue.2015.10.9.32 In-Block Level Redundancy Management for Flash Storage System Seung-Ho Lim Division of Computer and Electronic Systems Engineering Hankuk University

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

Guardian: Hypervisor as Security Foothold for Personal Computers

Guardian: Hypervisor as Security Foothold for Personal Computers Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),

More information

Windows Vista (DARC) Matthew Cook http://escarpment.net/ http://darc-tech.org.uk/

Windows Vista (DARC) Matthew Cook http://escarpment.net/ http://darc-tech.org.uk/ Windows Vista (DARC) Matthew Cook http://escarpment.net/ http://darc-tech.org.uk/ 1 Introduction to Vista Five years worth of development Complex and big product Many versions Lots of under the hood changes

More information

Executable Integrity Verification

Executable Integrity Verification Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Benchmarking Large Scale Cloud Computing in Asia Pacific

Benchmarking Large Scale Cloud Computing in Asia Pacific 2013 19th IEEE International Conference on Parallel and Distributed Systems ing Large Scale Cloud Computing in Asia Pacific Amalina Mohamad Sabri 1, Suresh Reuben Balakrishnan 1, Sun Veer Moolye 1, Chung

More information